Who is this article for?
CrashPlan for Small Business, no.
Code42 for Enterprise, yes.
Link: Product plans and features.
This article applies to version 5.
Other available versions:
Using a Code42 managed appliance, Code42 can proactively monitor your Code42 environment to prevent issues and gather information about potential problems before they occur. Code42's managed appliance monitoring requires network access to your managed appliance. This ensures proper functioning of your managed appliance and is not a significant security issue for your network.
The Code42 Customer Champion team continuously monitors your managed appliance’s performance, reliability, and status for the following reasons:
- To prevent problems from occurring.
- To proactively fix problems before they affect your service.
- To solve serious issues or problems as quickly as possible.
- To monitor disk usage, in order to warn you before you run out of disk space.
- In this case, we generally inform your sales representative or account manager, because they can consult with you about your future storage needs and solutions.
Continuous live monitoring is a critical component that you are automatically entitled to with the purchase of a managed appliance. Code42 monitors these status elements and problem indicators, as well as others:
- Code42 CrashPlan service status
- Code42 CrashPlan version and update availability
- Out of memory alerts
- Low disk space alerts
- Out of disk space alerts
- RAID array health
- Database health
- Web administration console responsiveness
Low disk storage
Another key benefit of live monitoring is that we are alerted when you start to run low on disk storage capacity, and we are able to consult with you on the best approach for providing more capacity, in the form of a new storage node or JBOD.
We configure the internal firewall of the managed appliance to prevent connections or attacks by unauthorized devices and network ranges. You may also configure your firewall to block all outbound connections from the appliance to the outer world except for our monitoring server’s network range and port. Thus, monitoring is a very secure service.
Finally, in the unlikely event that an attacker were able to capture the outbound monitoring stream, this data does not contain any information that would enable an attacker to compromise the appliance. The data contains only generic metrics of system performance, and does not contain usernames, passwords, or other proprietary information.
If a hard drive fails, we will automatically send you a message about the failed drive, identify the precise location of the failed drive, tell you what type of drive to replace the failed drive with, and create an order with our logistics department for a new onsite spare drive.
If you do not allow us to monitor the managed appliance, it will be impossible for us to keep your RAID array in optimal condition. Thus, lack of monitoring would prevent your data from having the safety and security that managed appliances are designed to provide.